SlideShare a Scribd company logo
1 of 20
Download to read offline
‫أكاديمية الحكومة اإللكترونية الفلسطينية‬
         The Palestinian eGovernment Academy
                     www.egovacademy.ps




Tutorial 6: The Legal Framework of New Technologies

                      Session9
                Cybercrime

                Dr. Feras Milhem


                        PalGov © 2011                        1
About

This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the
Commission of the European Communities, grant agreement 511159-TEMPUS-1-
2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps
Project Consortium:
             Birzeit University, Palestine
                                                           University of Trento, Italy
             (Coordinator )


             Palestine Polytechnic University, Palestine   Vrije Universiteit Brussel, Belgium


             Palestine Technical University, Palestine
                                                           Université de Savoie, France

             Ministry of Telecom and IT, Palestine
                                                           University of Namur, Belgium
             Ministry of Interior, Palestine
                                                           TrueTrust, UK
             Ministry of Local Government, Palestine


Coordinator:
Dr. Mustafa Jarrar
Birzeit University, P.O.Box 14- Birzeit, Palestine
Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011
                                                                                                 2
© Copyright Notes
Everyone is encouraged to use this material, or part of it, but should properly
cite the project (logo and website), and the author of that part.


No part of this tutorial may be reproduced or modified in any form or by any
means, without prior written permission from the project, who have the full
copyrights on the material.




                   Attribution-NonCommercial-ShareAlike
                                CC-BY-NC-SA

This license lets others remix, tweak, and build upon your work non-
commercially, as long as they credit you and license their new creations
under the identical terms.

                                    PalGov © 2011                                 3
ILOs


• Introduce legal framework of crimes
  committed through the net in Palestine,
.‫• مقدمة عن اإلطار القانونً الجرٌمة األلكترونٌة فً فلسطٌن‬
Increase the knowledge of the trainee on
  the importance of this subject. Orientation
  on the type of Cybercrimes.
           .‫زٌادة المعرفة حول الجرائم األلكترونٌة وانواعها‬
Orientations on the international efforts to
  overcome crimes of this type.

                    PalGov © 2011                      4
The legal framework of Penal Law
‫اإلطار القانوني لتشريعات الجزاء‬

• In the West Bank: The Penal Law of
  1960.
       1960 ‫• في الضفة الغربية: قانون العقوبات لسنة‬
• In the Gaza Strip: The Penal Law of
  1936
          .1936 ‫• في قطاع غزة: قانون العقوبات لسنة‬

BOTH LAWS do not regulate
 cybercrimes.
              ‫كال القانون ال ينظمان جرائم الحاسوب‬
                 PalGov © 2011                  5
The legal framework of Penal Law
         ‫اإلطار القانوني لتشريعات الجزاء‬


• No other laws provide penalties to crimes
  committed online.

‫• ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق‬
                                      .‫الشبكة االلكترونية‬

• CONSEQUENCE: Perpetrators escape
  legal accountability

                           PalGov © 2011                     6
What is Cybercrime
‫ما هي الجرائم األلكترونية‬


  Illegal activity committed on the internet.
     This is a broad term that describes
   everything from electronic cracking to
     denial of service attacks that cause
      electronic commerce sites to lose
                                 money".

‫كل أشكال السلوك غٌر المشروع الذى ٌرتكب باستخدام‬
                                         ‫الحاسب‬

                      PalGov © 2011               7
What is Cybercrime
‫ما هي الجرائم األلكترونية‬

Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking,
  distribution, posting, and dissemination of
  obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property),
  transmission of harmful programmes.

- Cybercrimes against government.
Terrorism, money laundry



                      PalGov © 2011                     8
Current Threat
‫التهديدات القائمة‬

Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking,
  distribution, posting, and dissemination of
  obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property),
  transmission of harmful programmes.

- Cybercrimes against government.
Terrorism, money laundry



                    PalGov © 2011                       9
Current Threat
‫التهديدات القائمة‬

- Crackers (Hackers): such as the intent to steal confidential
   data, acquire free software, or perform malicious destruction of
   files.
- Internet Fraud (Crimes of Deception), example trick via email
- Skimming is the theft of credit card information by
  typically dishonest employees
- Phishing: is a way of attempting to acquire
  information such as usernames, passwords, and
  credit card details
  - spam
- Money laundry
- Pornography and Illegal Obscenity



                        PalGov © 2011                                 10
Example Penal Law: Estonia
‫مثال قانون جزاء‬

- Article 268. Computer Fraud
  Acquisition of other’s property or deriving of
  benefits through introduction of computer
  programs or data, as well as their modification,
  deletion, blocking or another kind of
  interference with the procedure of processing
  information that influences its results and
  causes direct property or another damage to a
  person are punished with fine, arrest or
  imprisonment within the term from one to six
  years.
                        ‫- بخصوص األحتٌال عبر األنترنت‬

                  PalGov © 2011                   11
Example Penal Law: Estonia
‫مثال قانون جزاء‬


- Article 269. Deletion of computer
  information or software

  1. Illegal deletion, damage, violation or
  blocking of computer information or
  software are punished with fine or
  arrest
  ‫- بخصوص تجرٌم حذف أو إعتداء أو تخرٌب أو حجب‬
              ‫معلومات من الكمبٌوتر أو أحد برامجه‬

                PalGov © 2011                12
Example Penal Law: Estonia
‫مثال قانون جزاء‬

- Article 270. Computer sabotage
  Introduction of data or programs, their
  modification, deletion or blocking to create
  disturbance interferences in the work of computer
  or telecommunication system are punished with
  fine, arrest or imprisonment within up to two
  years.
     ‫- ٌعاقب كل من أدخل معلومات بشكل غٌر مشروع أو قام بتعدٌل أو‬
    ‫حذف أو حجب لخلق اضطراب على عمل جهاز الكمبٌوتر أو نظام‬
 ‫االتصاالت السلكٌة والالسلكٌة باالعتقال أوالغرامة أو السجن مدة تصل‬
                                                         .‫الى عامٌن‬
 ً‫- هناك تشدٌد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرٌب‬
                                                     ‫لسجالت الدولة‬


                       PalGov © 2011                            13
Example Penal Law: Estonia
‫مثال قانون جزاء‬


- Article 272. Illegal interruption or blocking
  of the computer system connection
   ‫- تقطٌع أو إغالق غٌر شرعً للربط عبر نظام الحاسوب‬
- Article 273. Obvious spread of computer
  viruses
                         ‫- نشر للفٌروسات عبر الحاسوب‬
- Article 274. Transfer of protecting codes
         ‫- نقل شفرات محمٌة سواء فً البرامج أو الشبكات‬


                  PalGov © 2011                   14
Conventions/treaties
‫مواثيق إتفاقيات‬


• No unified position on international
   agreement.
• Council of Europe: Convention on
   Cybercrime
It is open for other states that the states
   of CoE
                     ‫ال توجد إتفاقٌة مصادق علٌها عالمٌا‬
          ‫مجلس دول أوروبا: إتفاقٌة حول جرائم الحاسوب‬
    ‫االتفاقٌة مفتوحة أمام دول من خارج مجلس دول أوروبا‬
                   PalGov © 2011                    15
Budapest: Convention on Cybercrime
OBJECTIVES


• Pursue a common criminal policy
  aimed at the protection of society
  against cybercrime by adopting
  appropriate legislation and fostering
  international co-operation.
     ‫• السعً نحو سٌاسة جزائٌة موحدة تهدف إلى حماٌة‬
   ً‫المجتمع من جرائم الحاسوب، وذلك عن طرٌق تبن‬
      .ً‫تشارٌع مناسبة وعن طرق تعزٌز التعاون الدول‬


                 PalGov © 2011                 16
Budapest: Convention on Cybercrime


 Called to adopt measures in the national level for:
- Illegal Access
- Illegal interception
- Data interference
- System interference
- Misuse of devices
- Computer related forgery
- Computer related fraud
- Pornography
- Infringements of Copyright
Call to adapt procedural provision


                   PalGov © 2011                       17
Summary

• Palestine laws are silent about Cybercrimes.
  No protection or punishment policies are
  available. However, the new draft Penal Law
  regulates some rules.
       ‫• ال ٌوجد تجرٌم فً فلسطٌن للجرائم المقترفة عبر الشبكة‬
                                                   .‫األلكترونٌة‬
• No international agreements, however, there
  are regional agreements such as Budapest
  convention.
       ‫• ال توجد إتفاقٌات دولٌة وإنما أقلٌمٌة مثل إتفاقٌة بودابست‬
• E-government in Palestine must be protected.

                      PalGov © 2011                           18
References

• Palestine Penal Law of 1936 .
• The Jordanian Penal Law of 1960.
• Florence de Villenfagne, CRIDS, University of Namur,
  PowerPoint Presentation on Cybercrimes, 2011.
• Estonian Penal Law
  http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism
  /Estonia.pdf
•
• Budapest: Convention on Cybercrime
  http://www.coe.int/t/dghl/cooperation/economiccrime/cyb
  ercrime/cy-activity-interface-
  2010/presentations/Ws%203/cyber_octopus_WS_3_alex
  ander_CCC_global_frame.pdf
   ً‫• عبد الفتاح بٌومً حجازي، التجارة األلكترونٌة فً القانون العربً النموذج‬
  2006 ،ً‫لمكافحة جرائم الكمبٌوتر واألنترنت، األسكندرٌة، دار الفكر الجامع‬


                          PalGov © 2011                                19
Session End



    PalGov © 2011   20

More Related Content

What's hot

Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
Raunaq Jaiswal
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on CybercrimeCTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
Commonwealth Telecommunications Organisation
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
Michael Owen
 

What's hot (18)

Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on CybercrimeCTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
 
110 koenig
110 koenig110 koenig
110 koenig
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
File000165
File000165File000165
File000165
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
File000167
File000167File000167
File000167
 
20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media20140314 Belgian Senate Judicial action of police on social media
20140314 Belgian Senate Judicial action of police on social media
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Richard Cooke - Birketts LLP - ICE Bribery Act Presentation
Richard Cooke - Birketts LLP - ICE Bribery Act PresentationRichard Cooke - Birketts LLP - ICE Bribery Act Presentation
Richard Cooke - Birketts LLP - ICE Bribery Act Presentation
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Security Wars
Security WarsSecurity Wars
Security Wars
 

Similar to Pal gov.tutorial6.session9.cybercrime

CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
RomanoGabrillo1
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
Pal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidencePal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidence
Mustafa Jarrar
 
Pal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlinePal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outline
Mustafa Jarrar
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
Commonwealth Telecommunications Organisation
 

Similar to Pal gov.tutorial6.session9.cybercrime (20)

Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Pal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidencePal gov.tutorial6.session6.digital signature & e evidence
Pal gov.tutorial6.session6.digital signature & e evidence
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Pal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlinePal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outline
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Amicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov caseAmicus curae roskomsvoboda_echr_kharitonov case
Amicus curae roskomsvoboda_echr_kharitonov case
 
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga EbodeCTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
CTO Cybersecurity Forum 2013 Justin Aime Tsanga Ebode
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_
 

More from Mustafa Jarrar

Habash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingHabash: Arabic Natural Language Processing
Habash: Arabic Natural Language Processing
Mustafa Jarrar
 
Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing
Mustafa Jarrar
 
Jarrar: Sparql Project
Jarrar: Sparql ProjectJarrar: Sparql Project
Jarrar: Sparql Project
Mustafa Jarrar
 

More from Mustafa Jarrar (20)

Clustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisClustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment Analysis
 
Classifying Processes and Basic Formal Ontology
Classifying Processes  and Basic Formal OntologyClassifying Processes  and Basic Formal Ontology
Classifying Processes and Basic Formal Ontology
 
Discrete Mathematics Course Outline
Discrete Mathematics Course OutlineDiscrete Mathematics Course Outline
Discrete Mathematics Course Outline
 
Business Process Implementation
Business Process ImplementationBusiness Process Implementation
Business Process Implementation
 
Business Process Design and Re-engineering
Business Process Design and Re-engineeringBusiness Process Design and Re-engineering
Business Process Design and Re-engineering
 
BPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsBPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical Constructs
 
BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs  BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Customer Complaint Ontology
Customer Complaint Ontology Customer Complaint Ontology
Customer Complaint Ontology
 
Subset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesSubset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion Rules
 
Schema Modularization in ORM
Schema Modularization in ORMSchema Modularization in ORM
Schema Modularization in ORM
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in Palestine
 
Lessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesLessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online Courses
 
Presentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalPresentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-final
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
Habash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingHabash: Arabic Natural Language Processing
Habash: Arabic Natural Language Processing
 
Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing
 
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsRiestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
 
Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020
 
Jarrar: Sparql Project
Jarrar: Sparql ProjectJarrar: Sparql Project
Jarrar: Sparql Project
 

Recently uploaded

!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 

Recently uploaded (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 

Pal gov.tutorial6.session9.cybercrime

  • 1. ‫أكاديمية الحكومة اإللكترونية الفلسطينية‬ The Palestinian eGovernment Academy www.egovacademy.ps Tutorial 6: The Legal Framework of New Technologies Session9 Cybercrime Dr. Feras Milhem PalGov © 2011 1
  • 2. About This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the Commission of the European Communities, grant agreement 511159-TEMPUS-1- 2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps Project Consortium: Birzeit University, Palestine University of Trento, Italy (Coordinator ) Palestine Polytechnic University, Palestine Vrije Universiteit Brussel, Belgium Palestine Technical University, Palestine Université de Savoie, France Ministry of Telecom and IT, Palestine University of Namur, Belgium Ministry of Interior, Palestine TrueTrust, UK Ministry of Local Government, Palestine Coordinator: Dr. Mustafa Jarrar Birzeit University, P.O.Box 14- Birzeit, Palestine Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011 2
  • 3. © Copyright Notes Everyone is encouraged to use this material, or part of it, but should properly cite the project (logo and website), and the author of that part. No part of this tutorial may be reproduced or modified in any form or by any means, without prior written permission from the project, who have the full copyrights on the material. Attribution-NonCommercial-ShareAlike CC-BY-NC-SA This license lets others remix, tweak, and build upon your work non- commercially, as long as they credit you and license their new creations under the identical terms. PalGov © 2011 3
  • 4. ILOs • Introduce legal framework of crimes committed through the net in Palestine, .‫• مقدمة عن اإلطار القانونً الجرٌمة األلكترونٌة فً فلسطٌن‬ Increase the knowledge of the trainee on the importance of this subject. Orientation on the type of Cybercrimes. .‫زٌادة المعرفة حول الجرائم األلكترونٌة وانواعها‬ Orientations on the international efforts to overcome crimes of this type. PalGov © 2011 4
  • 5. The legal framework of Penal Law ‫اإلطار القانوني لتشريعات الجزاء‬ • In the West Bank: The Penal Law of 1960. 1960 ‫• في الضفة الغربية: قانون العقوبات لسنة‬ • In the Gaza Strip: The Penal Law of 1936 .1936 ‫• في قطاع غزة: قانون العقوبات لسنة‬ BOTH LAWS do not regulate cybercrimes. ‫كال القانون ال ينظمان جرائم الحاسوب‬ PalGov © 2011 5
  • 6. The legal framework of Penal Law ‫اإلطار القانوني لتشريعات الجزاء‬ • No other laws provide penalties to crimes committed online. ‫• ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق‬ .‫الشبكة االلكترونية‬ • CONSEQUENCE: Perpetrators escape legal accountability PalGov © 2011 6
  • 7. What is Cybercrime ‫ما هي الجرائم األلكترونية‬ Illegal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money". ‫كل أشكال السلوك غٌر المشروع الذى ٌرتكب باستخدام‬ ‫الحاسب‬ PalGov © 2011 7
  • 8. What is Cybercrime ‫ما هي الجرائم األلكترونية‬ Some categorized cybercrimes into three Ref. cyberlaws.net: - Cybercrimes against persons. child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material. - Cybercrimes against property. computer vandalism (destruction of others' property), transmission of harmful programmes. - Cybercrimes against government. Terrorism, money laundry PalGov © 2011 8
  • 9. Current Threat ‫التهديدات القائمة‬ Some categorized cybercrimes into three Ref. cyberlaws.net: - Cybercrimes against persons. child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material. - Cybercrimes against property. computer vandalism (destruction of others' property), transmission of harmful programmes. - Cybercrimes against government. Terrorism, money laundry PalGov © 2011 9
  • 10. Current Threat ‫التهديدات القائمة‬ - Crackers (Hackers): such as the intent to steal confidential data, acquire free software, or perform malicious destruction of files. - Internet Fraud (Crimes of Deception), example trick via email - Skimming is the theft of credit card information by typically dishonest employees - Phishing: is a way of attempting to acquire information such as usernames, passwords, and credit card details - spam - Money laundry - Pornography and Illegal Obscenity PalGov © 2011 10
  • 11. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 268. Computer Fraud Acquisition of other’s property or deriving of benefits through introduction of computer programs or data, as well as their modification, deletion, blocking or another kind of interference with the procedure of processing information that influences its results and causes direct property or another damage to a person are punished with fine, arrest or imprisonment within the term from one to six years. ‫- بخصوص األحتٌال عبر األنترنت‬ PalGov © 2011 11
  • 12. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 269. Deletion of computer information or software 1. Illegal deletion, damage, violation or blocking of computer information or software are punished with fine or arrest ‫- بخصوص تجرٌم حذف أو إعتداء أو تخرٌب أو حجب‬ ‫معلومات من الكمبٌوتر أو أحد برامجه‬ PalGov © 2011 12
  • 13. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 270. Computer sabotage Introduction of data or programs, their modification, deletion or blocking to create disturbance interferences in the work of computer or telecommunication system are punished with fine, arrest or imprisonment within up to two years. ‫- ٌعاقب كل من أدخل معلومات بشكل غٌر مشروع أو قام بتعدٌل أو‬ ‫حذف أو حجب لخلق اضطراب على عمل جهاز الكمبٌوتر أو نظام‬ ‫االتصاالت السلكٌة والالسلكٌة باالعتقال أوالغرامة أو السجن مدة تصل‬ .‫الى عامٌن‬ ً‫- هناك تشدٌد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرٌب‬ ‫لسجالت الدولة‬ PalGov © 2011 13
  • 14. Example Penal Law: Estonia ‫مثال قانون جزاء‬ - Article 272. Illegal interruption or blocking of the computer system connection ‫- تقطٌع أو إغالق غٌر شرعً للربط عبر نظام الحاسوب‬ - Article 273. Obvious spread of computer viruses ‫- نشر للفٌروسات عبر الحاسوب‬ - Article 274. Transfer of protecting codes ‫- نقل شفرات محمٌة سواء فً البرامج أو الشبكات‬ PalGov © 2011 14
  • 15. Conventions/treaties ‫مواثيق إتفاقيات‬ • No unified position on international agreement. • Council of Europe: Convention on Cybercrime It is open for other states that the states of CoE ‫ال توجد إتفاقٌة مصادق علٌها عالمٌا‬ ‫مجلس دول أوروبا: إتفاقٌة حول جرائم الحاسوب‬ ‫االتفاقٌة مفتوحة أمام دول من خارج مجلس دول أوروبا‬ PalGov © 2011 15
  • 16. Budapest: Convention on Cybercrime OBJECTIVES • Pursue a common criminal policy aimed at the protection of society against cybercrime by adopting appropriate legislation and fostering international co-operation. ‫• السعً نحو سٌاسة جزائٌة موحدة تهدف إلى حماٌة‬ ً‫المجتمع من جرائم الحاسوب، وذلك عن طرٌق تبن‬ .ً‫تشارٌع مناسبة وعن طرق تعزٌز التعاون الدول‬ PalGov © 2011 16
  • 17. Budapest: Convention on Cybercrime Called to adopt measures in the national level for: - Illegal Access - Illegal interception - Data interference - System interference - Misuse of devices - Computer related forgery - Computer related fraud - Pornography - Infringements of Copyright Call to adapt procedural provision PalGov © 2011 17
  • 18. Summary • Palestine laws are silent about Cybercrimes. No protection or punishment policies are available. However, the new draft Penal Law regulates some rules. ‫• ال ٌوجد تجرٌم فً فلسطٌن للجرائم المقترفة عبر الشبكة‬ .‫األلكترونٌة‬ • No international agreements, however, there are regional agreements such as Budapest convention. ‫• ال توجد إتفاقٌات دولٌة وإنما أقلٌمٌة مثل إتفاقٌة بودابست‬ • E-government in Palestine must be protected. PalGov © 2011 18
  • 19. References • Palestine Penal Law of 1936 . • The Jordanian Penal Law of 1960. • Florence de Villenfagne, CRIDS, University of Namur, PowerPoint Presentation on Cybercrimes, 2011. • Estonian Penal Law http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism /Estonia.pdf • • Budapest: Convention on Cybercrime http://www.coe.int/t/dghl/cooperation/economiccrime/cyb ercrime/cy-activity-interface- 2010/presentations/Ws%203/cyber_octopus_WS_3_alex ander_CCC_global_frame.pdf ً‫• عبد الفتاح بٌومً حجازي، التجارة األلكترونٌة فً القانون العربً النموذج‬ 2006 ،ً‫لمكافحة جرائم الكمبٌوتر واألنترنت، األسكندرٌة، دار الفكر الجامع‬ PalGov © 2011 19
  • 20. Session End PalGov © 2011 20